1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zhenek [66]
4 years ago
13

Regarding computer protection, quarantining is defined as ________. Select one: A. placing a found virus in a secure area on the

hard drive B. deleting an infected file C. repairing an infected file D. updating your antivirus software
Computers and Technology
1 answer:
MatroZZZ [7]4 years ago
3 0

Answer:

A. placing a found virus in a secure area on the hard drive

Explanation:

When a file is defected in a computer, quarantining is applied to prevent other parts of the computer. The infected file is isolated and if you let your antivirus software, it can delete the infected file.

You might be interested in
What makes this information systems environment unique? (3 points)
QveST [7]

Information technologies are unique not just because of their growing use in decision-making and knowledge management systems, important as that is. Their use has also yielded significant improvements in the efficiency of energy and materials use.

6 0
3 years ago
When creating an excel budget and performing what-if analysis, it is generally easiest to ______.
Rufina [12.5K]

When creating an Excel budget and performing what-if analysis, it is generally easiest to create the budget with a budgeting assumption tab

  • Assumptions in a budget brings about projections by adding one's assumptions to the current data.

  • It is very important to create a budgeting assumptions tab when creating a master budget in microsoft excel because it will simplifies the process of getting how changes to a master budget's main assumptions influences all cornered schedules and the projected financial statements of said firm.

Conclusively we can say that Excel budget and performing what-if analysis produces the budget with a budgeting assumption tab

Learn more from

brainly.com/question/17198039

4 0
2 years ago
Fill in each blank with the correct answer/output.
borishaifa [10]

Answer:

37

Explanation:

Given int[] vals = {7,5,3,9,0,37,93,16,68,6,99};

In programming, the position of each value in the list are known as index. The first value is always assigned index of 0 not 1, the second value is assigned index of 1 and so on. For example;

val[0] = 7 i.e value with index 0

val[1] = 5

val[4] = 0

In order to print out this value

System.out.println(vals[vals[1]+vals[4]]);

Substituting the index value val[1] and val[4] into the argument given

vals[vals[1]+vals[4]]

= vals[5+0]

= vals[5]

= 37 (value at the 5th index)

System.out.println(vals[vals[1]+vals[4]]);

= 37

This means that the system will print out 37 to the console

4 0
4 years ago
The Wired Equivalent Privacy standard had what significant disadvantage?
Ivanshal [37]

Answer:

Wired equivalent privacy standard has the significant disadvantages as, it is uses the static encryption keys. Wired equivalent privacy are the security and the privacy protocol which are used for designing the wireless local area network. And the static encryption key are used to set up the router for encrypting the packet in the device. The main disadvantage is that it enables the MAC address and it is easily detectable by the hackers.  

 

6 0
3 years ago
Read 2 more answers
Which is TRUE about web-based application software? It is stored completely on a web server instead of your hard drive. It is in
mote1985 [20]

It is TRUE that a web-based application is stored completely on a web server instead of your hard drive.

Explanation:

Web apps can be accessed over the internet over a HTTP network. These applications are hosted on a remote server and can be accessed easily via a browser. We can only go as far downloading them to our desktop but we cannot make adjustments to them after we have downloaded them. All changes are made on a web browser.

Its mechanism is so easy. It is based on client-server architecture. The client will interact with the application by inputting data. The server, on the other hand, will receive, store, and help in retrieving the result. Accessing applications such as Word online or Spreadsheets online is the best example of how web apps can be accessed over the internet.

Learn more about web-based applications:

brainly.com/question/9385062

brainly.com/question/12887254

#LearnWithBrainly

5 0
3 years ago
Other questions:
  • Which ipv6 static route would serve as a backup route to a dynamic route learned through ospf?
    12·1 answer
  • You notice that somehow you have duplicate records for some of your clients in your database. What should you do?
    13·2 answers
  • 9. A change in the appearance of a value or label in a cell
    5·1 answer
  • ___________ is a technique that uses IT to develop an ongoing relationship with the purchasers or buyers of an organization's pr
    13·1 answer
  • Accepted identifier for a variable in PHP except:
    8·1 answer
  • Antwon is building his technical writing portfolio.He created the following checklist: •check whether any part of the portfolio
    11·1 answer
  • Al these are benefits of computer literacy except
    14·1 answer
  • What is a file explore?
    12·1 answer
  • What is<br> a an<br> output device
    10·1 answer
  • Debbie can use the feature in the email to copy her manager on the email without her colleague knowing she did so
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!